Image Steganography Using Cryptography Techniques

Read Complete Research Material

Image Steganography Using Cryptography Techniques

Image Steganography Using Cryptography Techniques



Abstract

In this traditional world the issues of providing the higher security to the information have been emerging a lot of various (miscellaneous) activities that has lead the corporate world to many serious problems. In this corporate world the main security must be provided to the private information from being manipulated during the transmission or the communication rather than the hardware parts. These emerging miscellaneous activities may cause a lot of damage to the data which may lead to the loss of the corporate companies. In order to provide security for the data in this project I am using a new concept called the STEGNOGRAPHY that is derived from a Greek word which actually means hidden data transmission. This is achieved by hiding one type of file format into the other type of file format. As I am developing this project as a web application, the source will be in the JAVA language. The implementation of this project at the end have met all the basic and main aims of the security and is proven to be suited perfectly for the issues concerning to the information security. As the project has been successfully implemented, I gained a complete and good knowledge on this subject.

Table of contents

ABSTRACT2

SYNOPSIS6

CHAPTER 17

1.0Introduction7

1.1 Background7

1.2 Methods8

1.3 Aim and Objectives of the Project8

AIM8

1.4 OBJECTIVES9

Chapter 210

LITERATURE SURVEY10

2.0 Types of Steganograpy Techniques10

2.1 DIGITAL WATERMARKING IN STEGANOGRAPY10

2.1.2 LSB MODULATIONS IN STEGANOGRAPY10

2.1.3 DATA HIDDEN USING AN AUDIO FILE IN STEGANOGRAPY10

2.1.4 ECHO HIDING IN STEGANOGRAPY10

2.1.5 HIDING DATA IN IP (INTERNET PROTOCOLS)11

2.1.6 HIDING DATA IN VIDEO FILES IN STEGANOGRAPY11

2.2 WORKING OF STEGANOGRAPHY12

2.2.1 FINDING A HIDDEN “LSB STEGANOGRAPHY”12

2.2.2 WORKING OF STEGANOGRAPHY IN DIGITAL IMAGES12

2.2.3 WORKING OF STEGANOGRAPHY FOR JPEG IMAGES12

2.2.4 BLIND STEGANALYSIS12

2.2.5 WORKING ON KEYS FOR STEGANOGRAPHY12

2.3 PROBLEM AND EXPLOITATIONS IN STEGANOGRAPHY13

2.3.1 Problem13

2.3.2 EXPLOITATION13

2.4 THE VIGENERE ALGORITHM13

2.5 CREATION OF JAVA14

2.5.1 JAVA SERVLETS14

2.5.2 (JSP) JAVA SERVER PAGES14

2.5.3 APACHE15

2.5.5 TOMCAT15

2.5.6 JAVA SERVER FACES15

2.5.7 TECHNOLOGY OF JAVA SERVER FACES15

2.5.8 MYFACE/ TOMAHAWK15

2.5.9 CSS15

2.5.10 ANT16

2.5.11 HTML16

2.5.12 RESOURCE BUNDLES16

2.5.13 STEGANOGRAPHIC METHODS16

2.5.15 EXAMPLES OF PALETTE SIGNATURE21

2.5.16 DESTROYING STEGANOGRAPHY AND WATERMARKS21

CHAPTER 326

3.0 PROJECT DESCRIPTION26

3.1 DETAILS OF MODULE26

3.1.1 DATA EMBEDDING AND DE-EMBEDDING26

3.1.2 DATA COMPRESSION AND DECOMPRESSION29

3.1.3 WEB APPLICATION29

System Analysis29

4.0 Present system29

4.1 PROPOSED SYSTEM30

4.1.1 DESCRIPTION OF STEGNOGRAPHY30

4.2 FEASIBILITY STUDY31

4.2.1 ANALYSIS OF THE FEASIBILITY OF STEGNOGRAPHY31

4.2.2 ANALYSIS FEASIBILITY IN CASE OF ECONOMY32

CHAPTER 534

DATA FLOW DIAGRAMS34

5.0 INTRODUCTION34

5.1 DATA FLOW DIAGRAM34

CHAPTER 636

SYSTEM IMPLEMENTATION36

6.0 IMPLEMENTING SOFTWARES36

6.0.1 Web Applications36

6.0.2 Embed36

6.0.3 DE-EMBED36

6.0.4 COMPRESSION36

6.0.5 DE-COMPRESSION36

6.0.6 HELP37

6.1 DIFFERENT FORMATS FOR STEGENOGRAPHY37

6.1.1 BMP IMAGE FILE IN STEGENOGRAPHY37

6.1.2 JPEG IMAGE FILE IN STEGENOGRAPHY37

6.1.3 COMPRESSING DATA IN STEGENOGRAPHY38

CHAPTER 739

7.0 STEGANOGRAPHY WORKING39

CHAPTER 855

8.0 TESTING THE SOFTWARE55

8.0.1 UNIT TESTING55

8.0.3 TOP-TO-DOWN INTEGRATION55

8.0.4 BOTTOM-UP INTEGRATION55

8.0.5 VALIDATION TESTING55

8.0.6 SYSTEM TESTING55

8.1 SUPPORT THE MAINTENANCE OF THE SOFTWARE56

CHAPTER 957

9.1 IMPLEMENTATION OF MINE58

CHAPTER 1059

10. CONCLUSION59

REFERENCES60

Synopsis

My project provides a high level security to the data that is being transmitted from place to the other place. In my project I have used a new method called “Stegnography”. In the method of cryptography the security is provided by just encrypting the data using any encryption algorithms. Where as in the case of Stegnography besides encryption the data is also hidden ...
Related Ads
  • Digital Imaging Techniques
    www.researchomatic.com...

    Digital Imaging Techniques, Digital Imaging Techniqu ...

  • Steganography
    www.researchomatic.com...

    Steganography, Steganography Essay writing help sour ...

  • Cryptography
    www.researchomatic.com...

    Cryptography, through various means, warrant that co ...

  • Cryptography
    www.researchomatic.com...

    Cryptography, Cryptography Research Papers writing h ...

  • Steganography And Stegana...
    www.researchomatic.com...

    Users can publish their own images as well as ...